Yangseo Choi

Orcid: 0000-0002-6243-2111

According to our database1, Yangseo Choi authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
1
1
1
1
1
1
3
1
1
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel approach for application classification with encrypted traffic using BERT and packet headers.
Comput. Networks, 2024

Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms.
Proceedings of the 15th International Conference on Information and Communication Technology Convergence, 2024

2022
Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Protocol fuzzing to find security vulnerabilities of RabbitMQ.
Concurr. Comput. Pract. Exp., 2021

2020
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2016
A forensically robust data acquisition from a 10G line-rate network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Hierarchical network signature clustering and generation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Traffic storing and related information generation system for cyber attack analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Transmitted file extraction and reconstruction from network packets.
Proceedings of the 2015 World Congress on Internet Security, 2015

2014
Secure virtualised environment.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2012
AIGG Threshold Based HTTP GET Flooding Attack Detection.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Malware classification method via binary content comparison.
Proceedings of the Research in Applied Computation Symposium, 2012

2008
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities.
IEICE Trans. Inf. Syst., 2008

Function Call Mechanism Based Executable Code Detection for the Network Security.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
A Practical Approach for Detecting Executable Codes in Network Traffic.
Proceedings of the Managing Next Generation Networks and Services, 2007


  Loading...